Towerwall's InfoSec Blog

Content Type

See all

Application security is maturing, but independent testing is crucial

Open Web Application Security Project (OWASP) , appsec , Application Security , independent testing , OWASP , cannabis , vCISO , Enterprise

Michelle Drolet

Skills shortage is making shift to continuous appsec testing challenging. While application security (appsec) is firmly on the radar, most organizations still have a way to go before they can be confident about how secure their apps are. Devops is accelerating the speed of development and, coupled with the shift to the cloud, it’s creating many challenges for appsec. Breaking down walls between security, development and business units is easier said than done and the security skills shortagefalse

Michelle Drolet

Click here to watch our latest webinar from our "Lunch with a vCISO" series >

8 Cybersecurity Trends to Watch for in 2018

Verizon , European Union , Kmart , artificial intelligence , GDPR , Trends to Watch for in 2018 , ransomware , Internet of Things , General Data Protection Regulation (GDPR) , cybersecurity trends , Compliance , application testing , cannabis , cybersecurity professionals , Enterprise , Equifax

Michelle Drolet

New challenges and threats will face IT departments in the year ahead. As we stand on the threshold of another year, the war for our cybersecurity rages on. There have been many data breaches in 2017, most notably for Equifax, Verizon, and Kmart. But if you seek a silver lining in the cloud, perhaps you’ll be glad of the news that the global average cost of a data breach is down 10 percent over previous years to $3.62 million, according to the Ponemon Institute. Sadly, the average size of afalse

Michelle Drolet profiled in Boston Voyager

Michelle Drolet profiled in Boston Voyager

Boston , boston voyager , Smith & Wesson , Michelle Drolet , Middlesex Savings Bank , GDPR , CTO , HIPAA , Compliance & Privacy , Becker College , penetration testing , CannaCare , Compliance , cannabis , Enterprise

Michelle Drolet

Today we’d like to introduce you to Michelle Drolet...

Second Nature Security: More Secure Networks through Behavior Modification, Security Awareness and Training

Second Nature Security: More Secure Networks through Behavior Modification, Security Awareness and Training

Fractional Chief Information Security Officer (CIS , cannabis , Enterprise

Michelle Drolet

Join us for our second live webinar: Second Nature Security: More Secure Networks through Behavior Modification, Security Awareness and Training Wednesday, December 13, 2017 | 12:00 PM EDT - 1:00 PM EDT Join us for a vCISO roundtable discussion featuring:

Can machine learning be used to shore up cyber defenses?

Sophos , machine learning , artificial intelligence , malware , Internet of Things , cybercriminals , cyber defense , cannabis , cybersecurity , Enterprise

Michelle Drolet

Deep learning can be a vital supplementary tool for cybersecurity. The meteoric rise of malware has put us all at risk. We are engaged in a never-ending race with cybercriminals to protect systems, plug gaps, and eradicate vulnerabilities before they can gain access. The front line grows by the day as we share more data and employ new network-connected devices via the rise of the Internet of Things. Keeping up with the fast pace of new malicious threats is a real challenge. If it takesfalse

The Darwin defense: can ‘genetic algorithms’ outsmart malware?

darwin defense , darwin , GDPR , malware , Compliance & Privacy , Malicious software , cannabis , Enterprise

Michelle Drolet

Coming to a future near you: software code that mutates and evolves. We often talk about computer systems and information security in biological terms. Threats and defenses evolve, viruses run rampant, and machines learn by emulating the neural networks in our brains. Cybersecurity is an endless war between attackers and defenders, just as biology is a war between predators and prey. What if we could create an automated process of selection for computer programs, where the fittest wouldfalse

Four Important Things Cannabis Businesses Can Learn from the Recent Equifax Data Breach

Cybersecurity Framework , Ponemon Institute , Compliance & Privacy , Compliance , cannabis , Data Breach , Equifax

Michelle Drolet

The headline-making Equifax data breach was one of the worst ever. Equifax exposed approximately 143 million consumers, but did not notify any of them. This data breach exposed vital information, such as driver’s license, credit cards, social security numbers, addresses, and birth dates. According to the Ponemon Institute, which conducts independent research on privacy, data protection and information security policy, the global average cost of data breaches is approximately $3.62 million. Whatfalse

5 questions to ask your CEO about cybersecurity

CEO , NIST , Cybersecurity Framework , GDPR , Chief Security Officer , Compliance & Privacy , penetration testing , Compliance , cannabis , Enterprise

Michelle Drolet

Why you need to go beyond compliance. Businesses will continue to face a ton of cyber threats, some of which will impact organizations severely enough to require security measures that will reach far beyond compliance. A Ponemon Institute study showed that the average compromised record cost approximately $194 per record. Loss of business due to cyber breaches were estimated to be approximately $3 million. As you can see, it's important to make sure that the risk of cyber breaches is takenfalse

Three crucial keys to understanding HIPAA compliance

Health Insurance Portability & Accountability , protected health information (PHI) , PIE , HIPAA , Compliance & Privacy , Compliance , cannabis , Enterprise

Michelle Drolet

You already know how important it is to be HIPAA compliant. A lot of businesses, including registered marijuana dispensaries, get confused about the requirements, when it comes to dealing with protected health information. It can get a little fuzzy, if you're not privy to the big picture. The Health Insurance Portability & Accountability Act was created in order to set a standard for safeguarding private patient information. Any entity dealing with this kind of protected health informationfalse